Ensuring the security of your mobile business intelligence
|
|
|
- Mark Jennings
- 10 years ago
- Views:
Transcription
1 IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence
2 2 Ensuring the security of your mobile business intelligence Contents 2 Executive summary 3 Securing BI on mobile devices 4 Apple ipad native application and device security 7 BlackBerry native application and device security 10 Web application security 11 Conclusion 11 About IBM Business Analytics 12 For more information Executive summary The number of mobile devices has now surpassed personal computers in sales. They are increasingly being used for business, which means that users expect to access all the applications they need to do their jobs, including business intelligence (BI), on these devices. Because BI can be sensitive and confidential, they also want to be sure it is protected from unauthorized users such as hackers and that it can t be accessed if the device is lost or stolen. IBM Cognos Mobile software has been delivering relevant information to smart phones such as the BlackBerry for some time. However, enhancements to Cognos Mobile now make it possible for users to interact with trusted BI content on their Apple ipad, BlackBerry PlayBook and Android 3.0 tablet computers, for a rich and visual experience that enables uninterrupted productivity. Making Cognos Business Intelligence available to more mobile device users invariably raises questions about the security of the BI they view and work with. IBM is aware of these concerns and has gone to significant lengths to ensure the security of Mobile operating on smart phones and tablet devices. Cognos Mobile security is derived from a combination of sources. From IBM, you get the same security provided to all Business Intelligence environments through the Cognos platform, along with other security features specific to Cognos Mobile. Other features are provided from device vendors or your IT department. This paper describes how Mobile is secured.
3 IBM Software 3 Securing BI on mobile devices One of the biggest concerns organizations have when it comes to adopting mobile business intelligence (BI) is security. This is hardly surprising, given that the term mobile conjures up an image of important data being transmitted over unsecured networks, increasing fears of unauthorized access to or loss of sensitive corporate data. Mobile security can be broken down into several areas: Data access, or providing users with only the data they are authorized to see Data transmission, or securing communication channels Data storage, or protecting data stored on the device Device security, or protecting the device from unauthorized usage Deployment security, or configuring, provisioning, implementing or monitoring the mobile solution safely In addition, no matter how you access Cognos Mobile from a native application or the web your underlying security base will be the Cognos platform. The Cognos platform provides integration with enterprise authentication and a central place to control access and authorization for all Cognos Business Intelligence objects, capabilities and data. This integration makes single sign-on for authentication possible, simplifying the login process and restricting access to data according to business requirements. In addition, the Cognos platform supports LDAP, NTLM, Microsoft Active Directory, Netegrity and SAP Business Information Warehouse, among others. In essence, it makes the most of your existing enterprise security deployments and includes the ability to link to one or more security systems simultaneously, as you require. To ensure the security of Cognos Mobile, IBM addressed these areas as they relate to the ways that users access BI on their devices: The Apple ipad native application (available for download from the Apple itunes app store) The BlackBerry smart phone native application The web application, which can be used on your Apple iphone, BlackBerry Playbook and tablets that use the Android 3.0 operating system.
4 4 Ensuring the security of your mobile business intelligence Apple ipad native application and device security The Cognos Mobile native application for the Apple ipad uses a combination of Cognos platform, IT and device (or Apple ios) enabled security (Figure 1) to address the five areas of security mentioned in the previous section. Securing data access on the Apple ipad For secure data access on the ipad, Cognos Mobile uses Cognos platform authentication and role-based security. A device lease key prevents access to disconnected Cognos content when a timeout period elapses. A good analogy of the lease key functionality is the concept of a hotel key. The key is enabled for the duration (lease) of your stay. Then, at the checkout time on the last day of your stay, your key is disabled (your lease has expired) and you are unable to access the room. The room is still there, but you will not be able to gain access until you make appropriate arrangements. OTA ipad configuration (device level security policies, VPN settings, passcodes, etc.) Application sandboxing Device wipe etc. Mobile Device Management Solution Local encryption BI server authentication Device lease key VPN Platform BI Mobile Service IT Corporate Firewall Leverage platform and role based security Cognos Enabled Security IT Enabled Security MDM/iOS Enabled Security Report Data Source Content Store Figure 1: Cognos Mobile native ipad application security
5 IBM Software 5 In the case of Mobile, upon expiration of the lease key, content is not accessible until the user authenticates and a new key is granted. This ensures that disconnected content is inaccessible without wiping the entire device. Securing Apple ipad data transmission Cognos Mobile takes advantage of standard VPN protocols or an SSL connection to ensure a secure communication channel. Support for your enterprise network Wi-Fi enables secure access to your corporate network when you are on premises. This secure access can be enabled with the VPN client that is part of the Apple ipad operating system or third-party applications from Juniper, Cisco and F5 networks. Your ipad comes with support for Cisco IPSec, Layer 2 Tunneling Protocol (L2TP) over IPSec and Point-to-Point Tunneling Protocol (PPTP). If your company supports one of these protocols, you do not have to make any additional configurations to connect your ipad to your VPN. Applications from Juniper and Cisco are also available for enabling SSL VPN. You can configure these connections manually or use the Apple Configuration Profile. Your ipad also supports IPv6, proxy servers, split tunneling and other industry standards to ensure you have a rich VPN experience when connecting to your network. It also works with a number of authentication methods, such as passwords, two-factor tokens and digital certificates. VPN On Demand, which initiates a VPN session dynamically when connecting to specific domains, is also available to streamline environments that use digital certificates. Securing data storage on the Apple ipad Cognos Mobile fully supports the Apple hardware encryption that secures any data you store on the device. Apple Sandbox prevents other applications from accessing Cognos Business Intelligence data on the device. Apple Sandbox protects your system by limiting application operations, such as opening documents or accessing the network. Sandboxing makes it more difficult for a security threat to take advantage of an issue in a specific application to affect the greater system. The Apple Sandbox system consists of a set of user space library functions for initializing and configuring the sandbox for each process, a Mach server for handling logging from the kernel, a kernel extension using the TrustedBSD API for enforcing individual policies and a kernel support extension providing regular expression matching for policy enforcement. If a device that is storing Cognos Business Intelligence data is lost or stolen, it s important to deactivate and erase the device. In the case of the Apple ipad application, the Cognos Business Intelligence content stored on the device is protected by an Apple feature called remote wipe. With this feature, your administrator or device owner can issue a command that removes all data and deactivate the device.
6 6 Ensuring the security of your mobile business intelligence Securing your Apple ipad device Cognos Mobile fully exploits the ability to establish strong policies for device access that is provided by the Apple ipad platform. All devices have password (which Apple calls passcode ) formats that can be configured and enforced over the air. An extensive set of passcode formatting options can be set to meet security requirements, including timeout periods, passcode strength and how often the passcode must be changed. These methods provide flexible options for establishing a standard level of protection for all authorized users. A local wipe feature is also part of your Apple ipad device security. By default, ipad automatically wipes the device after 10 failed passcode attempts. However, you can configure your ipad to wipe the device after a different maximum number of failed attempts using a configuration profile. Secure Apple ipad deployment Apple ipad configuration is managed by the Apple ipad Configuration Utility, which enables an administrator to set up the corporate resources that the mobile users can use. This utility provides a centralized configuration of settings, such as Wi-Fi network connectivity, LDAP authentication information and secure VPN access. It can also be used to load provisioning profiles onto a device. Such centralized administration ensures that devices are configured correctly and according to security standards set by your organization. There is also an Apple iphone Configuration Utility that can install configuration profiles on devices when connected by USB. The configuration profile an XML file that is distributed to users and loaded on the mobile device is protected by a password only known to the administrator. After the profile has been loaded on the ipad, the settings cannot be changed from that profile unless someone uses the profile password. The profile can also be locked to the device and cannot be removed without completely erasing all of the device contents. Configuration profiles can be both signed and encrypted. Signing a configuration profile ensures that the settings being enforced cannot be altered in any way. Encrypting a configuration profile protects the contents of that profile and ensures installation only on the devices for which it was created. Configuration profiles are encrypted using CMS (Cryptographic Message Syntax, RFC 3852), supporting 3DES and AES 128. There are several ways that a configuration profile can be loaded on to the device: The device can be connected directly to the computer or server where the Apple Configuration Utility is installed. A link can be provided on a web page that will load the profile onto the device after it is accessed from a web browser on the device. An message can provide a link that will load the configuration profile.
7 IBM Software 7 In addition, Apple ios over-the-air enrollment and configuration provide an automated way to configure devices securely. This process provides IT with assurance that only trusted users are accessing corporate services and that their devices are properly configured to comply with established policies. Because configuration profiles can be both encrypted and locked, the settings cannot be removed, altered or shared with others. For geographically distributed enterprises, an over-the-air profile service enables you to enroll ios-based devices without physically connecting them to an Apple Configuration Utility host. Secure mobile device management With mobile device management capabilities provided by Apple, IT can easily scale the ipad application deployment for your entire organization. It provides a central point for managing all mobile devices that makes it possible to take advantage of configuration profiles, over the air enrollment and Apple push notification to enroll, configure, update settings, monitor compliance and remote wipe or lock ipads. Updates can be automatically installed on devices without any user intervention. In addition, monitoring capabilities make it possible to query devices for information to ensure compliance. BlackBerry native application and device security The Cognos Mobile native application for BlackBerry smart phones uses a combination of Cognos platform and Research in Motion (RIM) enabled security (Figure 2) to address the five areas of security mentioned earlier in this paper. Securing data access on the BlackBerry smart phone For secure data access on BlackBerry smart phones, Cognos Mobile uses Cognos platform and role-based security. This includes an administration option that allows saved credentials with a timeout period for Cognos Business Intelligence server authentication. Users must authenticate with the Cognos platform to gain access to local content. A device lease key prevents access to disconnected Cognos content after a specified period elapses. If a user is using Cognos Mobile on a personal Blackberry smart phone and leaves the company, you can ensure their disconnected content is inaccessible without wiping the entire device. Securing Blackberry smart phone data transmission All Cognos Business Intelligence data that is transmitted to BlackBerry smart phones is encrypted for secure Over the Air (OTA) data transfer and encrypted when stored on the device. This prevents unauthorized users from intercepting and reading sensitive data during transmission or from accessing data from the device with another application.
8 8 Ensuring the security of your mobile business intelligence OTA device configuration (security policies, application distribution, etc.) Device wipe Local encryption etc. Corporate Firewall Blackberry Enterprise Server NOC Architecture Encrypted communication Platform BI server authentication Device lease key BI Mobile Service IT Leverage platform and role based security Cognos Enabled Security RIM Enabled Security Report Data Source Content Store Figure 2: Cognos Mobile native application for Blackberry smart phone security Cognos Mobile takes advantage of the two transport encryption options offered by RIM, Advanced Encryption Standard (AES) and Triple Data Encryption Standard (Triple DES), for all data transmitted between BlackBerry Enterprise Server and BlackBerry smart phones. Private encryption keys are generated in a secure, two-way authenticated environment and are assigned to each BlackBerry smart phone user. Each secret key is stored only in the user s secure enterprise account and on their BlackBerry smart phone and can be regenerated wirelessly by the user.
9 IBM Software 9 Data sent to the BlackBerry smart phone is encrypted by BlackBerry Enterprise Server using the private key retrieved from the user s mailbox. The encrypted information travels securely across the network to the smart phone where it is decrypted with the key stored there. Data remains encrypted in transit and is not decrypted outside of the corporate firewall. Securing data storage on BlackBerry smart phones Cognos Mobile relies on BlackBerry Enterprise Server to extend corporate security to BlackBerry smart phones and provide administrators with tools to manage this security. To secure information stored on BlackBerry smart phones, you can make password authentication mandatory using the customizable IT policies of the BlackBerry Enterprise Server. By default, password authentication is limited to 10 attempts after which the smart phone memory is erased. Local encryption of all data (messages, address book entries, calendar entries, memos and tasks) can also be enforced by IT policy. And with the Password Keeper, AES encryption technology makes it possible to store password entries securely on BlackBerry smart phones. Additionally, system administrators can create and send wireless commands to remotely change BlackBerry device passwords and lock or delete information from lost or stolen BlackBerry smart phones. Securing BlackBerry devices Passwords ensure that only authorized users can utilize their BlackBerry smart phones. Administrators can enforce this password with configurable properties to prevent unauthorized access. In addition, a security timeout feature automatically locks the BlackBerry smart phone after a predetermined amount of inactivity. Secure BlackBerry native client deployment and management You can deploy the BlackBerry client in several ways: OTA application distribution pushes the native application through the BlackBerry Enterprise Server to a device. You can pull the application from a web server by clicking a link that downloads the application. You can install the application using the BlackBerry desktop manager. Device management capabilities are provided by the BlackBerry Enterprise Server, which includes device, IT policy and security updates. BlackBerry Enterprise Server also manages user settings and control groups with over 450 IT policies.
10 10 Ensuring the security of your mobile business intelligence Web application security The Cognos Mobile web application for BlackBerry PlayBook, Apple iphone and Android uses a combination of Cognos platform and web application enabled security (Figure 3) to address the five areas of security mentioned earlier in this paper. Because the web application does not store anything on your mobile device, there is no risk of unauthorized access to BI content if your device is lost or stolen. In addition, use of the HTTPS protocol prevents caching on your device s web browser. Device security is also not as critical because there is no stored BI data that could be exploited. NOC Architecture Encrypted communication NOC Service Provider Server Blackberry Playbook VPN Tunnel Corporate Firewall Platform Android BI Mobile Service IT BI server authentication No local storage Leverage platform and role based security Cognos Enabled Security IT Enabled Security MDM Enabled Security Report Data Source Content Store Figure 3: Cognos Mobile web application security
11 IBM Software 11 Securing data access on devices using the Cognos Mobile web application For secure data access on the BlackBerry Playbook and devices that use the Android operating systems, Cognos Mobile uses Cognos platform and role-based security. In addition, Cognos Business Intelligence server authentication is required every time a user accesses the application. Securing data transmission to the Cognos Mobile web application Securing data transmission for the web application is similar to how the Apple ipad native application is secured. Standard VPN protocols or an SSL connection ensure a secure communication channel. Support for your enterprise network Wi-Fi enables secure access to your corporate network when you are on premises. Secure deployment of the web application When you install the Cognos Mobile service, the mobile web application is automatically configured to /m on the end of your gateway URL. IT can provide the link and you can create a bookmark on the devices for easy access to the application. Upgrades of the application occurs on the server side, so there is no impact to those using it on their devices and no need to deploy new software or configuration to devices. Conclusion Cognos Mobile is designed for users who need to view, analyze and share Cognos Business Intelligence content wherever they are. Whether you are on the road or at the office, you get the same great insight. With this mobile capability, however, comes the inevitable question: Is Cognos Mobile secure? The answer is yes. Cognos Mobile relies on a combination of security provided by the Cognos platform, lease key technology, the device and operating system developers and IT security measures to ensure that your BI content is protected and safe from hackers and device loss or theft. About Business Analytics IBM Business Analytics software delivers actionable insights decision-makers need to achieve better business performance. IBM offers a comprehensive, unified portfolio of business intelligence, predictive and advanced analytics, financial performance and strategy management, governance, risk and compliance and analytic applications. With IBM software, companies can spot trends, patterns and anomalies, compare what if scenarios, predict potential threats and opportunities, identify and manage key business risks and plan, budget and forecast resources. With these deep analytic capabilities our customers around the world can better understand, anticipate and shape business outcomes.
12 For more information For further information or to reach a representative please visit ibm.com/analytics. Request a call To request a call or to ask a question, go to ibm.com/business-analytics/contactus. An IBM representative will respond to your inquiry within two business days. Copyright IBM Corporation 2011 IBM Corporation Software Group Route 100 Somers, NY U.S.A. Produced in the United States of America October 2011 All Rights Reserved IBM, the IBM logo, ibm.com and Cognos are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at ibm.com/legal/copytrade.shtml. Other company, product or service names may be trademarks or service marks of others. Please Recycle YTW03199-CAEN-00
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
company policies are adhered to and all parties (traders,
APPLICATION SECURITY OVERVIEW Users have access to additional layers of security that are controlled and determined by the company s ICE administrator. These are designed to ensure company policies are
IBM Cognos Mobile Overview
IBM Cognos Business Intelligence 10.2.1 IBM Cognos Mobile Overview Agenda IBM Cognos Mobile Overview Analysis on Mobile Security + Configuration Deploying Good Technology Latest Updates IBM Confidential
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Deploying iphone and ipad Virtual Private Networks
Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.
SharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices Mobile App Platform Copyright Information All Contents Copyright 2014 Incorporated. All Rights Reserved.
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Corporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
ManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
Securing end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Deploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
iphone and ipad in Business Deployment Scenarios
iphone and ipad in Business Deployment Scenarios September 2012 Learn how iphone and ipad integrate seamlessly into enterprise environments with these deployment scenarios. Microsoft Exchange ActiveSync
SAS Mobile BI Security and the Mobile Device
SAS Mobile BI Security and the Mobile Device Version 1.0 April 24, 2015 Contents Introduction...1 Security Features Provided by SAS Mobile BI and SAS Visual Analytics...2 Introduction... 2 Lock the SAS
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated.
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Improve your mobile application security with IBM Worklight
Improve your mobile application security with IBM Worklight Contents 1 Introduction 2 IBM Worklight overview 4 Enabling mobile security with IBM Worklight 6 Integrating IBM Worklight with enterprise security
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
PMDP is simple to set up, start using, and maintain
Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - [email protected] PMDP is simple to set
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
CA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
Reach more users with business intelligence
Reach more users with business intelligence Highlights Deliver BI information to users in the context of their day-to-day processes and applications Provide actionable intelligence to users, no matter
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
QuickStart Guide for Mobile Device Management. Version 8.6
QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
QuickStart Guide for Mobile Device Management
QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made
IBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
Novell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
